首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5318篇
  免费   221篇
  国内免费   13篇
电工技术   82篇
综合类   30篇
化学工业   1517篇
金属工艺   97篇
机械仪表   107篇
建筑科学   323篇
矿业工程   23篇
能源动力   99篇
轻工业   417篇
水利工程   34篇
石油天然气   2篇
无线电   322篇
一般工业技术   1106篇
冶金工业   583篇
原子能技术   41篇
自动化技术   769篇
  2023年   38篇
  2022年   50篇
  2021年   85篇
  2020年   75篇
  2019年   68篇
  2018年   83篇
  2017年   99篇
  2016年   142篇
  2015年   104篇
  2014年   165篇
  2013年   250篇
  2012年   224篇
  2011年   330篇
  2010年   249篇
  2009年   258篇
  2008年   257篇
  2007年   245篇
  2006年   241篇
  2005年   207篇
  2004年   179篇
  2003年   142篇
  2002年   119篇
  2001年   92篇
  2000年   94篇
  1999年   104篇
  1998年   126篇
  1997年   103篇
  1996年   96篇
  1995年   74篇
  1994年   77篇
  1993年   79篇
  1992年   76篇
  1991年   59篇
  1990年   61篇
  1989年   56篇
  1988年   63篇
  1987年   56篇
  1986年   49篇
  1985年   48篇
  1984年   62篇
  1983年   39篇
  1982年   49篇
  1981年   48篇
  1980年   31篇
  1979年   30篇
  1978年   35篇
  1977年   33篇
  1976年   35篇
  1975年   38篇
  1973年   31篇
排序方式: 共有5552条查询结果,搜索用时 21 毫秒
101.
Driving Automotive User Interface Research   总被引:2,自引:0,他引:2  
Cars offer an interesting but challenging microcosm for pervasive computing research and, in particular, for interaction with pervasive computing systems. Increasingly, researchers are looking at interactive applications in the car and investigating human-car interaction from a computer science—rather than an ergonomics or mechanical engineering—perspective. This article reports on the International Conference on Automotive User Interfaces and Interactive Vehicular Applications, wherein participants shared presentations on topics such as aesthetics, user interaction and distraction, safety, and driver monitoring.  相似文献   
102.
For the development of practical semantic applications, ontologies are commonly used with rule extensions. Prominent examples of semantic applications not only are Semantic Wikis, Semantic Desktops, but also advanced Web Services and agents. The application of rules increases the expressiveness of the underlying knowledge in many ways. Likewise, the integration not only creates new challenges for the design process of such ontologies, but also existing evaluation methods have to cope with the extension of ontologies by rules.Since the verification of Owl ontologies with rule extensions is not tractable in general, we propose to verify ontologies at the symbolic level by using a declarative approach: With the new language Datalog?, known anomalies can be easily specified and tested in a compact manner. We introduce supplements to existing verification techniques to support the design of ontologies with rule enhancements, and we focus on the detection of anomalies that especially occur due to the combined use of rules and ontological definitions.  相似文献   
103.
Der betriebliche Datenschutzbeauftragte dient der Selbstkontrolle der verantwortlichen Stelle. Wirksam ist solch eine Selbstkontrolle aber nur dann, wenn der Datenschutzbeauftragte auch Unabh?gigkeit genie?t. Welche Voraussetzungen hierfür erfüllt sein müssen, erl?utert der folgende Beitrag.  相似文献   
104.
A two-layer architecture for dynamic real-time optimization (or nonlinear modelpredictive control (NMPC) with an economic objective) is presented, where the solution of the dynamic optimization problem is computed on two time-scales. On the upper layer, a rigorous optimization problem is solved with an economic objective function at a slow time-scale, which captures slow trends in process uncertainties. On the lower layer, a fast neighboring-extremal controller is tracking the trajectory in order to deal with fast disturbances acting on the process. Compared to a single-layer architecture, the two-layer architecture is able to address control systems with complex models leading to high computational load, since the rigorous optimization problem can be solved at a slower rate than the process sampling time. Furthermore, solving a new rigorous optimization problem is not necessary at each sampling time if the process has rather slow dynamics compared to the disturbance dynamics. The two-layer control strategy is illustrated with a simulated case study of an industrial polymerization process.  相似文献   
105.
Explanation prompts usually foster conceptual understanding. However, it has been claimed within cognitive load theory that prompts can take cognitive load to the upper limit when learning complex contents. Under such circumstances, prompts focusing the learners’ attention on specific aspects (e.g., conceptual aspects such as elaborations on domain principles) might have some costs: Other important aspects (e.g., procedural aspects such as how to calculate) cannot be processed deeply. Thus, we expected that conceptually-oriented explanation prompts would foster the detailedness of explanations, the number of elaborations on domain principles, and conceptual knowledge. In addition, we tested the influence of such prompts on the number of calculations performed during learning and procedural knowledge. We conducted an experiment in which we employed conceptually-oriented explanation prompts in a complex e-learning module on tax law. Tax law university students (N = 40) worked on this e-learning module under two conditions: (a) conceptually-oriented explanation prompts, (b) no prompts. The prompts led to double-edged effects: positive effects on the detailedness of explanations and on the number of elaborations on domain principles, as well as on conceptual knowledge and simultaneously negative effects on the number of calculations performed during learning as well as on procedural knowledge.  相似文献   
106.
For evaluating visual-analytics tools, many studies confine to scoring user insights into data. For participatory design of those tools, we propose a three-level methodology to make more out of users' insights. The Relational Insight Organizer (RIO) helps to understand how insights emerge and build on one each other.  相似文献   
107.
The Expectation-Maximization (EM) algorithm is a very popular optimization tool for mixture problems and in particular for model-based clustering problems. However, while the algorithm is convenient to implement and numerically very stable, it only produces local solutions. Thus, it may not achieve the globally optimal solution in problems that have a large number of local optima. This paper introduces several new algorithms designed to produce global solutions in model-based clustering. The building blocks for these algorithms are methods from the operations research literature, namely the Cross-Entropy (CE) method and Model Reference Adaptive Search (MRAS). One problem with applying these methods directly is the efficient simulation of positive definite covariance matrices. We propose several new solutions to this problem. One solution is to apply the principles of Expectation-Maximization updating, which leads to two new algorithms, CE-EM and MRAS-EM. We also propose two additional algorithms, CE-CD and MRAS-CD, which rely on the Cholesky decomposition. We conduct numerical experiments of varying complexity to evaluate the effectiveness of the proposed algorithms in comparison to classical EM. We find that although a single run of the new algorithms is slower than a single run of EM, all have the potential for producing significantly better solutions. We also find that although repeat application of EM may achieve similar results, our algorithms provide automated, data-driven decision rules which may significantly reduce the burden of searching for the global optimum.  相似文献   
108.
Collaborative filtering systems are essentially social systems which base their recommendation on the judgment of a large number of people. However, like other social systems, they are also vulnerable to manipulation by malicious social elements. Lies and Propaganda may be spread by a malicious user who may have an interest in promoting an item, or downplaying the popularity of another one. By doing this systematically, with either multiple identities, or by involving more people, malicious user votes and profiles can be injected into a collaborative recommender system. This can significantly affect the robustness of a system or algorithm, as has been studied in previous work. While current detection algorithms are able to use certain characteristics of shilling profiles to detect them, they suffer from low precision, and require a large amount of training data. In this work, we provide an in-depth analysis of shilling profiles and describe new approaches to detect malicious collaborative filtering profiles. In particular, we exploit the similarity structure in shilling user profiles to separate them from normal user profiles using unsupervised dimensionality reduction. We present two detection algorithms; one based on PCA, while the other uses PLSA. Experimental results show a much improved detection precision over existing methods without the usage of additional training time required for supervised approaches. Finally, we present a novel and highly effective robust collaborative filtering algorithm which uses ideas presented in the detection algorithms using principal component analysis.  相似文献   
109.
Several types of microstructural changes in microelectronic solder materials are briefly discussed, namely the formation of intermetallics, Kirkendall voiding, spinodal decomposition, and coarsening. Moreover, a theoretical framework, based on the entropy principle, is developed by means of which constitutive equations can be derived that are necessary to understand and simulate such processes. The resulting equations are specialized to binary alloys and then investigated numerically. Finally, simulations of spinodal decomposition and coarsening are performed for the eutectic solder AgCu. The theoretical predictions are compared with experiments.
Andreas BrandmairEmail:
Wolfgang H. Müller (Corresponding author)Email:
  相似文献   
110.
Robust and accurate detection of the pupil position is a key building block for head-mounted eye tracking and prerequisite for applications on top, such as gaze-based human–computer interaction or attention analysis. Despite a large body of work, detecting the pupil in images recorded under real-world conditions is challenging given significant variability in the eye appearance (e.g., illumination, reflections, occlusions, etc.), individual differences in eye physiology, as well as other sources of noise, such as contact lenses or make-up. In this paper we review six state-of-the-art pupil detection methods, namely ElSe (Fuhl et al. in Proceedings of the ninth biennial ACM symposium on eye tracking research & applications, ACM. New York, NY, USA, pp 123–130, 2016), ExCuSe (Fuhl et al. in Computer analysis of images and patterns. Springer, New York, pp 39–51, 2015), Pupil Labs (Kassner et al. in Adjunct proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing (UbiComp), pp 1151–1160, 2014. doi: 10.1145/2638728.2641695), SET (Javadi et al. in Front Neuroeng 8, 2015), Starburst (Li et al. in Computer vision and pattern recognition-workshops, 2005. IEEE Computer society conference on CVPR workshops. IEEE, pp 79–79, 2005), and ?wirski (?wirski et al. in Proceedings of the symposium on eye tracking research and applications (ETRA). ACM, pp 173–176, 2012. doi: 10.1145/2168556.2168585). We compare their performance on a large-scale data set consisting of 225,569 annotated eye images taken from four publicly available data sets. Our experimental results show that the algorithm ElSe (Fuhl et al. 2016) outperforms other pupil detection methods by a large margin, offering thus robust and accurate pupil positions on challenging everyday eye images.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号